🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2023-43879

Rite CMS 3.0 has a Cross-Site scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload into the Global Content Blocks in the Administration Menu.

📖 Read

via "National Vulnerability Database".
CVE-2023-43862

D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formLanguageChange function.

📖 Read

via "National Vulnerability Database".
CVE-2023-43867

D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanL2TP function.

📖 Read

via "National Vulnerability Database".
CVE-2023-42756

A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.

📖 Read

via "National Vulnerability Database".
CVE-2023-43864

D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard55 function.

📖 Read

via "National Vulnerability Database".
CVE-2023-43863

D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanDhcpplus function.

📖 Read

via "National Vulnerability Database".
CVE-2023-43884

A Cross-site scripting (XSS) vulnerability in Reference ID from the panel Transactions, of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Reference ID' parameter.

📖 Read

via "National Vulnerability Database".
🦿 NordVPN Review (2023): Pricing, Security & Performance 🦿

Is NordVPN worth it? How much does it cost and is it safe to use? Read our NordVPN review to learn about pricing, features, security, and more.

📖 Read

via "Tech Republic".
🕴 Looking Beyond the Hype Cycle of AI/ML in Cybersecurity 🕴

Artificial intelligence and machine learning aren't yet delivering on their cybersecurity promises. How can we close the gaps?

📖 Read

via "Dark Reading".
1
🦿 How To Implement Zero Trust: Best Practices and Guidelines 🦿

Implement a Zero Trust security model with confidence with these best practices and tool suggestions to secure your organization.

📖 Read

via "Tech Republic".
🕴 Novel ZenRAT Scurries Onto Systems via Fake Password Manager Tool 🕴

Attackers exclusively target Windows users with an impersonation website that distributes information-stealing malware.

📖 Read

via "Dark Reading".
CVE-2023-5187

Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

📖 Read

via "National Vulnerability Database".
CVE-2023-5217

Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

📖 Read

via "National Vulnerability Database".
CVE-2023-39195

** REJECT ** CVE-2023-39195 was found to be a duplicate of CVE-2023-42755. Please see https://access.redhat.com/security/cve/CVE-2023-42755 for more information.

📖 Read

via "National Vulnerability Database".
CVE-2023-5186

Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)

📖 Read

via "National Vulnerability Database".
CVE-2023-30415

Sourcecodester Packers and Movers Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /inquiries/view_inquiry.php.

📖 Read

via "National Vulnerability Database".
🕴 Q&A: UK Ambassador on Creating New Cybersecurity Agencies Around the World 🕴

How the UK is assisting other nations in forming their own versions of a National Centre for Cybersecurity (NCSC).

📖 Read

via "Dark Reading".
CVE-2023-40375

Integrated application server for IBM i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. IBM X-Force ID: 263580.

📖 Read

via "National Vulnerability Database".
CVE-2023-5256

In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API.The core REST and contributed GraphQL modules are not affected.

📖 Read

via "National Vulnerability Database".
CVE-2023-43044

IBM License Metric Tool 9.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 266893.

📖 Read

via "National Vulnerability Database".
CVE-2023-43663

PrestaShop is an Open Source e-commerce web application. In affected versions any module can be disabled or uninstalled from back office, even with low user right. This allows low privileged users to disable portions of a shops functionality. Commit `ce1f6708` addresses this issue and is included in version 8.1.2. Users are advised to upgrade. There are no known workarounds for this issue.

📖 Read

via "National Vulnerability Database".